Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
Articles 1 - 15 of 15
Full-Text Articles in Physical Sciences and Mathematics
Stochastic Models Of Jaya And Semi-Steady-State Jaya Algorithms, Uday Chakraborty
Stochastic Models Of Jaya And Semi-Steady-State Jaya Algorithms, Uday Chakraborty
Computer Science Faculty Works
The Jaya algorithm and its variants have enjoyed great success in diverse application areas, but no theoretical analysis of the algorithm, to our knowledge, is available in the literature. In this paper we build stochastic models for analyzing Jaya and semi-steady-state Jaya algorithms. For these algorithms, the computational cost depends on how, at each iteration, the new individual fares against the existing individual. Costs must be incurred for any replacement of individuals and the subsequent update of the population-worst individual’s (and/or the population-best individual’s) index. We use the following two quantities as the main metrics for analysis: the expected number …
Connecting The Dots: The Boons And Banes Of Network Modeling, Sharlee Climer
Connecting The Dots: The Boons And Banes Of Network Modeling, Sharlee Climer
Computer Science Faculty Works
Network modeling transforms data into a structure of nodes and edges such that edges represent relationships between pairs of objects, then extracts clusters of densely connected nodes in order to capture high-dimensional relationships hidden in the data. This efficient and flexible strategy holds potential for unveiling complex patterns concealed within massive datasets, but standard implementations overlook several key issues that can undermine research efforts. These issues range from data imputation and discretization to correlation metrics, clustering methods, and validation of results. Here, we enumerate these pitfalls and provide practical strategies for alleviating their negative effects. These guidelines increase …
Machine Learning-Based Network Vulnerability Analysis Of Industrial Internet Of Things, Maede Zolanvari, Marcio Teixeira, Lav Gupta, Khaled Khan, Raj Jain
Machine Learning-Based Network Vulnerability Analysis Of Industrial Internet Of Things, Maede Zolanvari, Marcio Teixeira, Lav Gupta, Khaled Khan, Raj Jain
Computer Science Faculty Works
No abstract provided.
[Accepted Article Manuscript Version (Postprint)] Distributed Data-Gathering And -Processing In Smart Cities: An Information-Centric Approach, Reza Tourani, Abderrahmen Mtibaa, Satyajayant Misra
[Accepted Article Manuscript Version (Postprint)] Distributed Data-Gathering And -Processing In Smart Cities: An Information-Centric Approach, Reza Tourani, Abderrahmen Mtibaa, Satyajayant Misra
Computer Science Faculty Works
The technological advancements along with the proliferation of smart and connected devices (things) motivated the exploration of the creation of smart cities aimed at improving the quality of life, economic growth, and efficient resource utilization. Some recent initiatives defined a smart city network as the interconnection of the existing independent and heterogeneous networks and the infrastructure. However, considering the heterogeneity of the devices, communication technologies, network protocols, and platforms the interoperability of these networks is a challenge requiring more attention. In this paper, we propose the design of a novel Information-Centric Smart City architecture (iSmart), focusing on the demand of …
Distributed Data-Gathering And -Processing In Smart Cities: An Information-Centric Approach, Reza Tourani, Abderrahmen Mtibaa, Satyajayant Misra
Distributed Data-Gathering And -Processing In Smart Cities: An Information-Centric Approach, Reza Tourani, Abderrahmen Mtibaa, Satyajayant Misra
Computer Science Faculty Works
The technological advancements along with the proliferation of smart and connected devices (things) motivated the exploration of the creation of smart cities aimed at improving the quality of life, economic growth, and efficient resource utilization. Some recent initiatives defined a smart city network as the interconnection of the existing independent and heterogeneous networks and the infrastructure. However, considering the heterogeneity of the devices, communication technologies, network protocols, and platforms the interoperability of these networks is a challenge requiring more attention. In this paper, we propose the design of a novel Information-Centric Smart City architecture (iSmart), focusing on the demand of …
A Truthful Auction Mechanism For Mobile Crowd Sensing With Budget Constraint, Yuanni Liu, Xiaodan Xu, Jianli Pan, Jianhui Zhang, Guofeng Zhao
A Truthful Auction Mechanism For Mobile Crowd Sensing With Budget Constraint, Yuanni Liu, Xiaodan Xu, Jianli Pan, Jianhui Zhang, Guofeng Zhao
Computer Science Faculty Works
The selfishness and randomness of users in the mobile crowd sensing network could cause them unwilling to participate in sensing activities and lead to lower completion rates of sensing tasks. In order to deal with these problems, this paper proposes a novel incentive mechanism based on a new auction model for mobile crowd sensing, which consists of two consecutive stages. In the first stage, a novel Incentive Method based on Reverse Auction for Location-aware sensing (IMRAL) is proposed to maximize user utility. By introducing a task-centric method to determine the winning bids, it can provide higher user utility and higher …
Correction: A Novel Variant In Cmah Is Associated With Blood Type Ab In Ragdoll Cats, Badri Adhikari
Correction: A Novel Variant In Cmah Is Associated With Blood Type Ab In Ragdoll Cats, Badri Adhikari
Computer Science Faculty Works
No abstract provided.
Dynamic Technology Challenges Static Codes Of Ethics, Bo Brinkman, Catherine Flick, Don Gotterbarn, Keith Miller, Kate Vazansky, Marty J. Wolf
Dynamic Technology Challenges Static Codes Of Ethics, Bo Brinkman, Catherine Flick, Don Gotterbarn, Keith Miller, Kate Vazansky, Marty J. Wolf
Computer Science Faculty Works
We describe the process of changing and the changes being suggested for the ACM Code of Ethics and Professional Conduct. In addition to addressing the technical and ethical basis for the proposed changes, we identify suggestions that commenters made in response to the first draft. We invite feedback on the proposed changes and on the suggestions that commenters made.
Detecting And Tracking Attacks In Mobile Edge Computing Platforms, Abderrahmen Mtibaa, Khaled A. Harras, Hussein Alnuweiri
Detecting And Tracking Attacks In Mobile Edge Computing Platforms, Abderrahmen Mtibaa, Khaled A. Harras, Hussein Alnuweiri
Computer Science Faculty Works
Device-to-device (d2d) communication has emerged as a solution that promises high bit rates, low delay and low energy consumption which represents the key for novel technologies such as Google Glass, S Beam, and LTE-Direct. Such d2d communication has enabled computational offloading among collaborative mobile devices for a multitude of purposes such as reducing the overall energy, ensuring resource balancing across device, reducing the execution time, or simply executing applications whose computing requirements transcend what can be accomplished on a single device. While this novel computation platform has offered convenience and multiple other advantages, it obviously enables new security challenges and …
Ieee Access Special Section Editorial: Recent Advances In Software Defined Networking For 5g Networks, Mugen Peng, Tao Huang, Y. Richard Yu, Jianli Pan
Ieee Access Special Section Editorial: Recent Advances In Software Defined Networking For 5g Networks, Mugen Peng, Tao Huang, Y. Richard Yu, Jianli Pan
Computer Science Faculty Works
No abstract provided.
[Accepted Article Manuscript Version (Postprint)] Track Me To Track Us: Leveraging Short Range Wireless Technologies For Enabling Energy Efficient Wi-Fi-Based Localization, Mohamed Abdellatif, Abderrahmen Mtibaa, Khaled Harras
[Accepted Article Manuscript Version (Postprint)] Track Me To Track Us: Leveraging Short Range Wireless Technologies For Enabling Energy Efficient Wi-Fi-Based Localization, Mohamed Abdellatif, Abderrahmen Mtibaa, Khaled Harras
Computer Science Faculty Works
Given the success of outdoor tracking via GPS and the rise of real-time context-aware services, users will soon rely on applications that require higher granularity indoor localization. This need is further manifested in countries like Qatar, where various social and business activities occur indoors. Wi-Fi-based indoor localization is one of the most researched techniques due to its ubiquitous deployment and acceptable accuracy for a wide range of applications. However, we do not witness such techniques widely deployed mainly due to their high demand on energy, which is a precious commodity in mobile devices. We propose an energy-efficient indoor localization system …
Towards Node Cooperation In Mobile Opportunistic Networks, Abderrahmen Mtibaa, Khaled Harras
Towards Node Cooperation In Mobile Opportunistic Networks, Abderrahmen Mtibaa, Khaled Harras
Computer Science Faculty Works
Mobile devices such as smart-phones and tablets are becoming ubiquitous, with ever increasing communication capabilities. In situations where the necessary infrastructure is unavailable, costly, or overloaded, opportunistically connecting theses devices becomes a challenging area of research. Data is disseminated using nodes that store-carry-and-forward messages across the network. In such networks, node cooperation is fundamental for the message delivery process. Therefore, the lack of node cooperation (e.g., a node may refuse to act as a relay and settle for sending and receiving its own data) causes considerable degradation in the network. In order to ensure node cooperation in such networks, we …
Paranets: A Parallel Network Architecture For The Future Internet, Khaled Harras, Abderrahmen Mtibaa
Paranets: A Parallel Network Architecture For The Future Internet, Khaled Harras, Abderrahmen Mtibaa
Computer Science Faculty Works
The evolution of networking technologies and portable devices has led users to expect connectivity anytime and everywhere. We have reached the point of seeing networking occur underwater, via aerial devices, and across space. While researchers push the true boundaries of networking to serve a wide range of environments, there is the challenge of providing robust network connectivity beyond the boundaries of the core internet, defined by fiber optics and well-organized backbones. As the internet edges expand, the expectation is that connectivity will be as good, in terms of high bandwidth and minimal interruption, as anywhere in the core. Such an …
Software Test Automation, Phillip Laplante, Fevzi Belli, Jerry Gao, Greg Kapfhammer, Keith Miller, W. Eric Wong, Dianxiang Xu
Software Test Automation, Phillip Laplante, Fevzi Belli, Jerry Gao, Greg Kapfhammer, Keith Miller, W. Eric Wong, Dianxiang Xu
Computer Science Faculty Works
No abstract provided.
Review Of Information Technology And Moral Philosophy, Keith Miller, Bethany Spielman
Review Of Information Technology And Moral Philosophy, Keith Miller, Bethany Spielman
Computer Science Faculty Works
No abstract provided.